Analysis

  • max time kernel
    1799s
  • max time network
    1701s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-es
  • resource tags

    arch:x64arch:x86image:win10-20240221-eslocale:es-esos:windows10-1703-x64systemwindows
  • submitted
    28/02/2024, 17:00

General

  • Target

    https://cdn.discordapp.com/attachments/1136020719617183834/1136020797509599362/Public.bat?ex=65f0afd0&is=65de3ad0&hm=af5990f836df63b2e72da3ea3bfdb72cc517becdf18d78e4d0d34b2470993858&

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 32 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.discordapp.com/attachments/1136020719617183834/1136020797509599362/Public.bat?ex=65f0afd0&is=65de3ad0&hm=af5990f836df63b2e72da3ea3bfdb72cc517becdf18d78e4d0d34b2470993858&
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4728
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffea9629758,0x7ffea9629768,0x7ffea9629778
      2⤵
        PID:4308
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1824 --field-trial-handle=1808,i,5155413967287281612,18171080427043709502,131072 /prefetch:8
        2⤵
          PID:3592
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1504 --field-trial-handle=1808,i,5155413967287281612,18171080427043709502,131072 /prefetch:2
          2⤵
            PID:5108
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2112 --field-trial-handle=1808,i,5155413967287281612,18171080427043709502,131072 /prefetch:8
            2⤵
              PID:4856
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2952 --field-trial-handle=1808,i,5155413967287281612,18171080427043709502,131072 /prefetch:1
              2⤵
                PID:4888
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2944 --field-trial-handle=1808,i,5155413967287281612,18171080427043709502,131072 /prefetch:1
                2⤵
                  PID:1568
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 --field-trial-handle=1808,i,5155413967287281612,18171080427043709502,131072 /prefetch:8
                  2⤵
                    PID:404
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 --field-trial-handle=1808,i,5155413967287281612,18171080427043709502,131072 /prefetch:8
                    2⤵
                      PID:1948
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2352 --field-trial-handle=1808,i,5155413967287281612,18171080427043709502,131072 /prefetch:2
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4836
                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                    1⤵
                      PID:924

                    Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            1KB

                            MD5

                            ec147e7a4d268a36c995795ba1d5078f

                            SHA1

                            12641d4843ea4eb2a59d0cfa330950c4409d93df

                            SHA256

                            d26f7b853e3a670927f7c5d304116d9388641da332c7c57b63ca6cc42efe2496

                            SHA512

                            6e8508bb3f8db1ca041b1cb8b55123011d0b9889a93d8b7afcbb343dae5cae9bcd8bfd5b0e06c982975aab5a6806f6e8cc16e6c23ac82e20a5b499b3c802cd21

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            5KB

                            MD5

                            12356c9c1f89773a7ceb9eb1594e0354

                            SHA1

                            a9a3f5a88c4d776eda7bac3514d203188aa500de

                            SHA256

                            36eb44011b477f2c2209171210ccbfda47612cdbb408bb022fc9fc6b3aee58e1

                            SHA512

                            cfa574fff818e89ac5f966ed836b1b3795e3af1df0191bbbb1a20f0c007d2cdf98db73d05eea04c208511366893eaa8b1ea72ec696c6153d2185b1c88e268348

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            5KB

                            MD5

                            296cafd2a355ba8b46a24f08d13853ff

                            SHA1

                            1dd23676afd89a2ea5569e0881dc6340ba64ec5f

                            SHA256

                            12acc00e64b4e1aec81764c20fc4f16526f8232c7313a3a2001b6a28e57088b3

                            SHA512

                            4f74d5d2efc2fed8edb7841c5dd6136faae36dd55fec020b6b8c438928c31216baea237d810ef0bef2e550a06bd925f68d125e1ce638150709f44f47e530f91e

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            5KB

                            MD5

                            556e2220d7f68a2ec4714eedf63af3de

                            SHA1

                            25ea45c4b1e61d9658b834db019cadf2a6cdbbd0

                            SHA256

                            fffe1338fb66485df84fdee84d7850554fc8b26dc94d9d87e45f3846517bb7bd

                            SHA512

                            f4f2db472811b720e52ef6a9a8df897eaebb7ceb4960ae8867a73c01895567f719c42a2a7d9f9ad47b4a506e6ea2238cbfac277f237558aeb5fcc4e6ea242897

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            130KB

                            MD5

                            9fdff065343c972af9fe3babcfaa3890

                            SHA1

                            8b4b897ffb7a8a1e1395622a5d22ef9dddb32e93

                            SHA256

                            a07f9f179acaf6da085abf17b51d61da53a5049a7e3d4baa171a0e4d14c2308b

                            SHA512

                            4cd94b2de3db6c003666299926bc15f4495b8573dca0d60517c5f97962146a639c25736938cefc843a175f8ac8509530c4c3084140cb28d67d6d2d366dfe5127

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                            Filesize

                            2B

                            MD5

                            99914b932bd37a50b983c5e7c90ae93b

                            SHA1

                            bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                            SHA256

                            44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                            SHA512

                            27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd